Feds disrupt IoT botnets behind record-breaking DDoS attacks
Briefly

Feds disrupt IoT botnets behind record-breaking DDoS attacks
"The botnets largely spread across the usual soft underbelly of the internet, including routers, IP cameras, and digital video recorders that are often shipped with weak credentials and rarely patched."
"Officials said the networks were capable of generating traffic volumes exceeding 30 Tbps, with one attack peaking at roughly 31.4 Tbps."
"Prosecutors said the operators monetized access to the networks by offering DDoS-for-hire services and, in some cases, extorting victims by threatening to sustain attacks unless payments were made."
"The disruption itself focused on seizing domains and backend systems used to coordinate the botnets, effectively cutting off the instructions that tell infected devices where and when to send traffic."
The US government, in collaboration with Germany and Canada, disrupted four significant IoT botnets: Aisuru, KimWolf, JackSkid, and Mossad. These botnets compromised over three million devices, including routers and IP cameras, often due to weak security. They were responsible for hundreds of thousands of DDoS attacks, with traffic volumes exceeding 30 terabits per second. The operators monetized these networks through DDoS-for-hire services and extortion. The operation involved seizing domains and backend systems to cut off the botnets' command-and-control capabilities.
Read at Theregister
Unable to calculate read time
[
|
]